Name: | rubygem-rexml |
---|---|
Version: | 3.3.6 |
Release: | 3.module+el9.4.0+90406+79f381be |
Architecture: | noarch |
Module: | ruby:3.3:9040020240906110954:9 |
Group: | Unspecified |
Size: | 464085 |
License: | BSD-2-Clause |
RPM: | rubygem-rexml-3.3.6-3.module+el9.4.0+90406+79f381be.noarch.rpm |
Source RPM: | ruby-3.3.5-3.module+el9.4.0+90406+79f381be.src.rpm |
Build Date: | Thu Sep 19 2024 |
Build Host: | build-ol9-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | https://github.com/ruby/rexml |
Summary: | An XML toolkit for Ruby |
Description: | REXML was inspired by the Electric XML library for Java, which features an easy-to-use API, small size, and speed. Hopefully, REXML, designed with the same philosophy, has these same features. I've tried to keep the API as intuitive as possible, and have followed the Ruby methodology for method naming and code flow, rather than mirroring the Java API. REXML supports both tree and stream document parsing. Stream parsing is faster (about 1.5 times as fast). However, with stream parsing, you don't get access to features such as XPath. |
- Upgrade to Ruby 3.3.5 Resolves: RHEL-57576 - Fix DoS vulnerability in rexml. (CVE-2024-39908) (CVE-2024-41946) (CVE-2024-43398) Resolves: RHEL-57573 Resolves: RHEL-57570 Resolves: RHEL-57578 - Fix REXML DoS when parsing an XML having many specific characters such as whitespace character, >] and ]>. (CVE-2024-41123) Resolves: RHEL-57567 - Fix incorrect symlink for rubygem-irb's library. Resolves: RHEL-57597
- Upgrade to Ruby 3.3.1. Resolves: RHEL-37697 - Fix buffer overread vulnerability in StringIO. (CVE-2024-27280) Resolves: RHEL-37699 - Fix RCE vulnerability with .rdoc_options in RDoc. (CVE-2024-27281) Resolves: RHEL-37696 - Fix Arbitrary memory address read vulnerability with Regex search. (CVE-2024-27282) Resolves: RHEL-37698
- Upgrade to Ruby 3.3.0. Resolves: RHEL-17089
- Bypass git submodule test failure on Git >= 2.38.1. - Fix tests with Europe/Amsterdam pre-1970 time on tzdata version 2022b. - Fix for tzdata-2022g. - Fix OpenSSL.fips_mode and OpenSSL::PKey.read in OpenSSL 3 FIPS. Resolves: RHEL-5590 - ssl: use ffdhe2048 from RFC 7919 as the default DH group parameters Related: RHEL-5590 - Disable fiddle tests that use FFI closures. Related: RHEL-5590